WireLurker: A New Age In Mac OSX, iOS Malware

  /     /     /  
Publicated : 22/11/2024   Category : security


WireLurker: A New Age In Mac OSX, iOS Malware


WireLurker authors are likely independent individuals based in China who are Mac development experts and cybercrime amateurs.



Individuals just beginning to dabble in cybercrime are ushering in a new age of iOS and Mac OSX malware, according to
research released Wednesday by Palo Alto Networks
. The new malware, dubbed WireLurker, has been in active development for months, has infected probably hundreds of thousands of OSX and iOS devices, but has not yet done any real damage.
The WireLurker attackers probably arent people who do this often, says Ryan Olson, intelligence director of Palo Alto Networks Unit 42. They are clearly very skilled MacOS or iOS developers, but they definitely are not very experienced in writing malware.
The WireLurker attackers seem to have been fiddling with the malware without a coherent plan of attack in place. The only data they ever extracted was information to help distribute the malware -- device IDs and contact lists, not SMS message content or other sensitive data. They didnt employ some basic cybercrime best practices -- like obfuscation and encrypting command-and-control traffic -- until version 3.
Nevertheless, they created a threat unlike anything Mac users have had to contend with before.
The attackers Trojanized 467 OSX apps on the Maiyadi App Store, a third-party Mac app store in China thats particularly good at stocking pirated software. Palo Alto estimates that almost all of the Mac apps uploaded to Maiyadi between April 30 and June 11 were infected with WireLurker. Olson says Maiyadi was abused but not compromised; the attackers themselves most likely infected the applications and uploaded them themselves, instead of somehow infecting apps that had been uploaded by others. All told, those Trojanized apps were downloaded more than 356,000 times.
Though WireLurker does infect OSX laptop and desktop machines, the ultimate target seems to be iOS devices. When the two are connected through USB, the OSX machine will look for certain apps on the iOS device and pull them on to the OSX machine, which replaces certain components of that app with malware and pushes it back to the iOS device. This is only the second malware that attacks iOS through OSX via USB, and it is the first to automate generation of malicious iOS apps through this binary file replacement tactic.
One of the newer versions of WireLurker infects iOS in a way that is weird by any account, says Olson. Apple has an enterprise provisioning system that businesses can use to develop proprietary applications and distribute them through their company machines without having to go through the App Store. The third version of WireLurker was able to infect non-jailbroken iOS devices with an app that was signed with an Apple enterprise provisioning certificate -- but it wasnt malware. It was a legitimate app from a comic book company.
So this was probably a test, says Olson, and the next step would be to deploy a malicious or infected certified application. In the meantime, Apple has revoked the cert, but WireLurker has proven that non-jailbroken iPhones can be infected in this manner.
The importance of WireLurker is not WireLurker specifically but that the use of all these techniques... is really new and different for Mac, Olson says. Nevertheless, I dont think this is going to be a huge widespread problem. Apple is still largely protected by the tight control it has over its app stores, but theyre not immune.
As for who created WireLurker, Palo Altos best guess is that this is one individual or a small group of individuals operating within China, independently of any nation-state. They could be a startup malware house, so to speak, in the new financially motivated, politically independent cybercrime underground growing behind the Great Wall. Trend Micro outlined the nature of this burgeoning industry in
a September report
.

Last News

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security

▸ Senate wants changes to cybercrime law. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
WireLurker: A New Age In Mac OSX, iOS Malware